Design and implement secure enterprise wireless networks

Assignment Help Computer Network Security
Reference no: EM133152302 , Length: 20 pages

MN603 Wireless Networks and Security - Melbourne Institute of Technology

Assessment - Wireless networks analysis, challenges, techniques and recommendations

Purpose: The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs:
a. Analyse and compare wireless communication protocols;
b. Apply and evaluate wireless network security techniques with consideration of ethical implications;
c. Design and implement secure enterprise wireless networks

Assignment Description

Tasks:

There are two parts to this assignment, i.e., part A and part B.
A. Write a group report on one of the following topics listed in Part A. Your tutor will allocate you a group number (maximum of five students in a group) and your topic. (65 Marks)
B. Demonstration. Make a group video demonstration of three wireless security tools.

Topic 1 - Wireless Security: Challenges, Approaches and Future Trends

Increasingly, organisation's are using wireless technology for vital communications they want to keep private, such as mobile e-commerce transactions, email, and corporate data transmissions. The open communications environment makes wireless transmissions more exposed than wired communications to malicious attacks. Write a research survey of the Wireless Security challenges and analyze their most recent solutions and developments. Your article should cover the following points:

• Background of the Wireless security
• Describe the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues.
• Overview of security attacks encountered in wireless networks.
• The contrast between wireless usage and security standards.
• Challenges involved in wireless communications.
• Overview of security issues, i.e., attacks, vulnerabilities, and threats in wireless networks
• Provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems.
• Make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.
• Compare wireless security techniques
• Discuss the security approaches for the various wireless technologies.

Topic 2 - IoT Network: Challenges, Security Threats and approaches
In recent years, the development of the Internet of Things technology has been very rapid. However, with the explosive growth of IoT devices, the challenges facing the IoT environment are becoming more and more serious. How to ensure the security of the IoT becomes a key issue. Write a research survey of the IoT network challenges and analyze their most recent solutions and developments. Your article should cover the following points:

• Background of the IoT security.
• Overview of IoT application domains and discusses the most important wireless IoT protocols

• Describe the security requirements of IoT networks, including their authenticity, confidentiality, integrity, and availability issues.
• Overview of security attacks encountered in IoT networks.
• Discuss the security issues in IoT applications.
• Review the threat challenges and IoT security models at each level of the Internet of Things
• Overview of security issues, i.e., attacks, vulnerabilities, and threats in IoT networks.
• Provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures.
• Provide the recommendations to improve the IoT infrastructure.

Instructions:

Prepare your article as below

1. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (800 - 2000 words)
• Literature Review (1000 - 4000 words)
• Main body (1000 - 3000 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)
2. The article must be a ‘Review'1 article, including at least 5 references and not more than 25.
3. Strictly follow the IEEE reference format for in-body citations and the references section.
4. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.

Part B description: Make a group video demonstration of three wireless security tools such as Kismet, Reaver, InSSIder and SolarWinds WiFi network analyzer. Prepare slides (between 8 - 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using the Zoom application (along with the presenters' video) addressing the following tasks:
1. Analyse and discuss the importance of your selected wireless security tools
2. Perform three selected wireless security tools
3. Identify and discuss the strengths and weaknesses of each wireless security tools
4. Which wireless security would you recommend? Justify your recommendation

Attachment:- Wireless Networks and Security.rar

Reference no: EM133152302

Questions Cloud

Approach of bgi of building alliance portfolio : Question 1: Is the approach of BGI of building alliance portfolio for fast growth is justified? What risk you anticipate for the BGI due to the network of allia
Briefly explain ethical objectivism : Present a central argument that you disagree with, and then respond by raising an objection or two to that argument. Another way is to present a central argumen
Calculate the value of the bond : Sterling Corporation issued a bond with a par value of $1000 and a coupon rate of 8%. Calculate the value of the bond
Write an email responding to the email enquiry : A client, Mick Burrows, emails you looking to lease 45/6 Forward Ave, Springfield, which is a commercial property with a floor area of 109sqm.
Design and implement secure enterprise wireless networks : Wireless networks analysis, challenges, techniques and recommendations Assessment - Analyse and compare wireless communication protocols
Potential implications for indian companies : The UK and India are presently in discussions for a new trade deal post Brexit. Answer the following questions based on your research.
Explain the possible advantages of miniperm financing : 1. Why, in some cases, must a developer begin leasing efforts even before the design is complete?
Explain theories of strategy or strategic management : Use at least two concepts or theories of strategy or strategic management to analyse the key priorities or challenges facing your team or work group, taking acc
Central california winemaking industry : Select 1 of the economic concentrations (clusters) below:

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd